General

  • Target

    3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31.exe

  • Size

    120KB

  • Sample

    241217-jxe9gsvlbw

  • MD5

    90b47eba502c1b8afee365bd04a70aa1

  • SHA1

    4bd43464e18a6bfdcf5711188bc8b517d748ab34

  • SHA256

    3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31

  • SHA512

    eec24c018e65729eb36ea1a58f0a582ec7c203d6b411ef91e05e2a96241053dbd26e2c6087df612f9a801f3bcfe50ab1b8402f284f97acbac1101b5abad7674d

  • SSDEEP

    3072:rhVihrNh3l/uOBUloF/iyCFSwTPFixJfeihh/Gbe:rTIll/u+U0i7FFMJXhhZ

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31.exe

    • Size

      120KB

    • MD5

      90b47eba502c1b8afee365bd04a70aa1

    • SHA1

      4bd43464e18a6bfdcf5711188bc8b517d748ab34

    • SHA256

      3619e1f8e33018161a7c34ab7988bb28eb7f353381edc531b3a9232fcc207d31

    • SHA512

      eec24c018e65729eb36ea1a58f0a582ec7c203d6b411ef91e05e2a96241053dbd26e2c6087df612f9a801f3bcfe50ab1b8402f284f97acbac1101b5abad7674d

    • SSDEEP

      3072:rhVihrNh3l/uOBUloF/iyCFSwTPFixJfeihh/Gbe:rTIll/u+U0i7FFMJXhhZ

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks